|
Message-Id: <19B3BD42-B3FF-4D64-BAAB-685557443BCD@beckweb.net> Date: Mon, 30 Jul 2018 16:10:46 +0200 From: Daniel Beck <ml@...kweb.net> To: oss-security@...ts.openwall.com Subject: Multiple vulnerabilities in Jenkins plugins Jenkins is an open source automation server which enables developers around the world to reliably build, test, and deploy their software. The following releases contain fixes for security vulnerabilities: * AccuRev Plugin 0.7.17 * Agiletestware Pangolin Connector for TestRail Plugin 2.2 * Anchore Container Image Scanner Plugin 1.0.17 * Confluence Publisher Plugin 2.0.2 * Inedo BuildMaster Plugin 2.0 * Inedo ProGet Plugin 1.0 * Kubernetes Plugin 1.10.2 * Maven Artifact ChoiceListProvider (Nexus) Plugin 1.3.2 * meliora-testlab Plugin 1.15 * Publish Over CIFS Plugin 0.11 * Resource Disposer Plugin 0.12 * SaltStack Plugin 3.1.6 * Shelve Project Plugin 2.0 * SSH Agent Plugin 1.16 * Tinfoil Security Plugin 2.0 * TraceTronic ECU-TEST Plugin 2.4 Summaries of the vulnerabilities are below. More details, severity, and attribution can be found here: https://jenkins.io/security/advisory/2018-07-30/ We provide advance notification for security updates on this mailing list: https://groups.google.com/d/forum/jenkinsci-advisories If you discover security vulnerabilities in Jenkins, please report them as described here: https://jenkins.io/security/#reporting-vulnerabilities --- SECURITY-704 When using the `sshagent` step inside a `withDockerContainer` block in Pipeline, the resulting logging of the `ssh-add` command included the SSH key passphrase in plain text. SECURITY-997 Resource Disposer Plugin did not perform permission checks on an API endpoint. This allowed users with Overall/Read access to Jenkins to stop tracking a specified resource. Additionally, this API endpoint did not require POST requests, resulting in a CSRF vulnerability. SECURITY-975 Publish Over CIFS Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to initiate CIFS connections to an attacker specified host. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnerability. SECURITY-982 Confluence Publisher Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to submit login requests to Confluence using attacker- specified credentials. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnerability. SECURITY-1016 Kubernetes Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified Kubernetes cluster using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnerability. SECURITY-840 Tinfoil Security Plugin stored the API Secret Key in its configuration unencrypted in its global configuration file on the Jenkins master. This key could be viewed by users with access to the master file system. SECURITY-932 TraceTronic ECU-TEST Plugin unconditionally disabled SSL/TLS certificate validation for the entire Jenkins master JVM. SECURITY-994 TraceTronic ECU-TEST Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL, with the path suffix `/app-version-info` appended. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnerability. SECURITY-1009 SaltStack Plugin did not perform permission checks on methods implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins, and to cause Jenkins to submit HTTP requests to attacker- specified URLs. Additionally, these form validation methods did not require POST requests, resulting in a CSRF vulnerability. SECURITY-1021 Accurev Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified Accurev server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these form validation methods did not require POST requests, resulting in a CSRF vulnerability. SECURITY-1001 Shelve Project Plugin did not escape the names of shelved projects on the UI, potentially resulting in a stored XSS vulnerability. SECURITY-1022 Maven Artifact ChoiceListProvider (Nexus) Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker- specified Nexus or Artifactory server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnerability. SECURITY-847 meliora-testlab Plugin stored the API Key in its configuration unencrypted in its global configuration file on the Jenkins master. This key could be viewed by users with access to the master file system. Additionally, the API key was not masked from view using a password form field. SECURITY-995 Agiletestware Pangolin Connector for TestRail Plugin did not perform permission checks on an API endpoint used to validate and save the plugin configuration. This allowed users with Overall/Read access to Jenkins to override the plugin configuration. Additionally, the API endpoint did not require POST requests, resulting in a CSRF vulnerability. SECURITY-1039 Anchore Container Image Scanner Plugin stored the password in its configuration unencrypted in its global configuration file on the Jenkins master. This password could be viewed by users with access to the master file system. SECURITY-933 Inedo ProGet Plugin unconditionally disabled SSL/TLS certificate validation for the entire Jenkins master JVM. SECURITY-935 Inedo ProGet Plugin unconditionally disabled SSL/TLS certificate validation for the entire Jenkins master JVM.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.